Get Exam Updates
🥳 CAT 5 Months Mega Sale 👉 Upto 70% Off on CAT 2022 courses today. Enroll here
For the following questions answer them individually
Hashed messageis signed by a sender using
his public key
his private key
receivers public key
receivers private key
An email contains a textual birthday greeting, a picture of a cake, and a song. The order is not important. What is the content-type ?
Rangeof IP Address from 18.104.22.168 to 22.214.171.124 are
Reserved for broadcast
Used for muticast packets
Reserved for future addressing
IEEE 802.11 is standard for
Whena host on network A sends a messageto a host on network B, which address doesthe router look at ?
Whichvof the following is not an approach to Software Process Assessment?
Standard CMMI Assessment Method for process improvement
A physical DFD specifies
what processes will be used
who generates data and who processesit
what each perscn in an organization does
which data will be generated
In UML diagram of a class
state of object cannot be represented
state is irrelevant
state is represented as an attribute
state is represented as a result of an operation
Which of the following models is used for software reliability ?
Djikstra's algorithm is used to
Flood an internet with information
Calculate the routing tables
Create a link state database
Boost your Prep!